Hails: Protecting data privacy in untrusted web applications DB Giffin, A Levy, D Stefan, D Terei, D Mazieres, JC Mitchell, A Russo 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2012 | 192 | 2012 |
Eliminating cache-based timing attacks with instruction-based scheduling D Stefan, P Buiras, EZ Yang, A Levy, D Terei, A Russo, D Mazières Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013 | 83 | 2013 |
An LLVM backend for GHC DA Terei, MMT Chakravarty Proceedings of the third ACM Haskell symposium on Haskell, 109-120, 2010 | 73 | 2010 |
Towards practical default-on multi-core record/replay AJ Mashtizadeh, T Garfinkel, D Terei, D Mazieres, M Rosenblum ACM SIGPLAN Notices 52 (4), 693-708, 2017 | 69 | 2017 |
Safe haskell D Terei, S Marlow, S Peyton Jones, D Mazières Proceedings of the 2012 Haskell Symposium, 137-148, 2012 | 68 | 2012 |
Canary: A scheduling architecture for high performance cloud computing H Qu, O Mashayekhi, D Terei, P Levis arXiv preprint arXiv:1602.01412, 2016 | 27 | 2016 |
Blade: A data center garbage collector D Terei, A Levy arXiv preprint arXiv:1504.02578, 2015 | 17 | 2015 |
Hails: Protecting data privacy in untrusted web applications D Giffin, A Levy, D Stefan, D Terei, D Mazières, J Mitchell, A Russo Journal of Computer Security 25 (4-5), 427-461, 2017 | 16 | 2017 |
Low level virtual machine for Glasgow Haskell Compiler DA Terei, MMT Chakravarty Bachelor’s Thesis, Computer Science and Engineering Dept., The University of …, 2009 | 13 | 2009 |
M3 high-performance memory management from off-the-shelf components D Terei, A Aiken, J Vitek ACM SIGPLAN Notices 49 (11), 3-13, 2014 | 3 | 2014 |
Security and the average programmer D Giffin, S Heule, A Levy, D Mazières, J Mitchell, A Russo, A Shen, ... Proceedings of POST, 2014 | 1 | 2014 |
Control, Performance and Safety in Programming Languages D Terei Stanford University, 2016 | | 2016 |
Demo proposal: making web applications-XSafe AA Levy, D Terei, D Stefan, D Maziéres ACM SIGPLAN Notices 49 (12), 91-91, 2014 | | 2014 |
azarasi/Dune: 对特权 CPU 功能的安全用户级访问 A Belay, A Bittau, A Mashtizadeh, D Terei, D Mazières, C Kozyrakis | | |
Security and the Average Programmer S Boyd-Wickizer, P Buiras, D Giffin, S Heule, E Kohler, A Levy, ... | | |
CS344M: Project Final Report D Terei | | |